[go: up one dir, main page]

US20090249485A1 - Techniques for Capturing Identifying Information on a Device User - Google Patents

Techniques for Capturing Identifying Information on a Device User Download PDF

Info

Publication number
US20090249485A1
US20090249485A1 US12/054,531 US5453108A US2009249485A1 US 20090249485 A1 US20090249485 A1 US 20090249485A1 US 5453108 A US5453108 A US 5453108A US 2009249485 A1 US2009249485 A1 US 2009249485A1
Authority
US
United States
Prior art keywords
computer system
user
identifying information
volatile storage
tracking mechanism
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/054,531
Other versions
US8490200B2 (en
Inventor
David Rivera
David C. Challener
Rod D. Waltermann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Switzerland International GmbH
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/054,531 priority Critical patent/US8490200B2/en
Assigned to LENOVO (SINGAPORE) PTE. LTD reassignment LENOVO (SINGAPORE) PTE. LTD ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHALLENER, DAVID C., RIVERA, DAVID, WALTERMANN, ROD D.
Publication of US20090249485A1 publication Critical patent/US20090249485A1/en
Application granted granted Critical
Publication of US8490200B2 publication Critical patent/US8490200B2/en
Assigned to LENOVO PC INTERNATIONAL reassignment LENOVO PC INTERNATIONAL NUNC PRO TUNC ASSIGNMENT (SEE DOCUMENT FOR DETAILS). Assignors: LENOVO (SINGAPORE) PTE LTD.
Assigned to LENOVO PC INTERNATIONAL LIMITED reassignment LENOVO PC INTERNATIONAL LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LENOVO (SINGAPORE) PTE. LTD.
Assigned to LENOVO SWITZERLAND INTERNATIONAL GMBH reassignment LENOVO SWITZERLAND INTERNATIONAL GMBH ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LENOVO PC INTERNATIONAL LIMITED
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Definitions

  • This disclosure relates generally to capturing identifying information and, more specifically, to techniques for capturing identifying information on a device user.
  • Laptop computer system are frequently stolen from locations such as coffee shops, college campuses, hotel rooms, homes, businesses, and motor vehicles. In general, theft of a computer system may result in the loss of photos, files, personal information, and business information that is stored on the stolen computer system.
  • devices such as desktop computer systems, notebook computer systems, laptop computer systems, and personal digital assistants (PDAs) usually execute a wide variety of applications.
  • a theft recovery application e.g., LoJack®
  • a computer system e.g., a portable (such as a laptop or notebook) or a desktop computer system
  • the installed theft recovery application upon activation, reports a location of the computer system to a monitoring center (when the computer system is coupled to the Internet via a wired or wireless connection).
  • authorities may be notified to recover the stolen computer system.
  • the authorities frequently do not have sufficient evidence to prosecute an individual in possession of the stolen computer system for the theft of the computer system or receiving stolen property.
  • a technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.
  • the captured identifying information may then be utilized by authorities (as evidence) to prosecute an individual in possession of a stolen device for the theft of the device or receiving stolen property.
  • a computer system includes an input device, non-volatile storage, and a processor coupled to the non-volatile storage and the input device.
  • the processor is configured to receive a tracking mechanism trigger and control the input device to capture identifying information on a user of the computer system in response to the trigger.
  • the processor is also configured to store the identifying information in the non-volatile storage, such that the identifying information may be later recovered by authorities and used as evidence in prosecution of the user.
  • FIG. 1 is a block diagram of a relevant portion of an example device (e.g., a computer system) that is configured to identify a user of the device, according to various embodiments of the present disclosure.
  • a device e.g., a computer system
  • FIG. 2 is a flowchart of a process for identifying a user of a device (e.g., a computer system), according to an embodiment of the present disclosure.
  • a device e.g., a computer system
  • aspects of the present invention may be embodied as a method, system, device, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a circuit, module, or system.
  • the computer-usable or computer-readable storage medium may be, for example, (but is not limited to) an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM) or flash memory, a portable compact disc read-only memory (CD-ROM), an optical storage device, or a magnetic storage device.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • CD-ROM compact disc read-only memory
  • the computer-usable or computer-readable storage medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
  • a computer-usable or computer-readable storage medium may be any medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • the term “coupled” includes both a direct electrical connection between blocks or components and an indirect electrical connection between blocks or components achieved using one or more intervening blocks or components.
  • a theft recovery application on a computer system is activated (in response to a received tracking mechanism trigger) after a theft of the computer system is reported to a device recovery service provider.
  • the trigger is used to initiate capture of identifying information on a user of the computer system.
  • the identifying information may include various biometric information, depending on individual capabilities of the computer system.
  • a computer system with an integrated camera may capture one or more pictures of the user following the trigger.
  • a computer system with integrated speech capability may capture voice of the user (via a microphone) following the trigger.
  • a computer system with an integrated fingerprint reader may capture a fingerprint of the user following the trigger.
  • an example device 100 may be configured to capture identifying information on a user of the device 100 in response to a tracking mechanism trigger, according to various embodiments of the present disclosure.
  • the trigger is generated by a device recovery service provider in response to receiving a reported theft of the device 100 .
  • the device 100 may be, for example, a computer system or a smart phone that executes an operating system (OS) and multiple applications, one of which is a theft recovery application.
  • the device 100 includes a processor 102 that is coupled to a memory controller 104 , which is coupled to a memory subsystem 106 and an input/output (I/O) controller 108 .
  • I/O input/output
  • the I/O controller 108 is coupled to an input device 110 , a vibrator 112 , a display 114 , a speaker 116 , an accelerometer 118 , and a network interface controller (NIC) 120 , which may facilitate a wired or wireless Internet connection.
  • NIC network interface controller
  • the processor 102 may include one or more processor cores and one or more levels of cache.
  • the memory subsystem 106 includes an application appropriate amount of volatile memory (e.g., dynamic random access memory (DRAM)) and non-volatile memory (e.g., read-only memory (ROM) and/or flash memory).
  • the input device 110 may include, for example, a pointing device (such as a mouse), a keyboard, a microphone, a fingerprint reader, and a camera, among other input devices.
  • the display 114 may be, for example, a cathode ray tube (CRT) or a liquid crystal display (LCD).
  • CTR cathode ray tube
  • LCD liquid crystal display
  • the processor 102 may also be coupled to one or more mass storage devices (not shown), e.g., non-volatile storage such as a hard disk drive (HDD) and/or a compact disc read-only memory (CD-ROM) drive, via a port.
  • mass storage devices e.g., non-volatile storage such as a hard disk drive (HDD) and/or a compact disc read-only memory (CD-ROM) drive
  • the device 100 also includes a power-in port 122 for receiving a power adapter cable or an AC power cable.
  • an example process 200 for identifying a user of a device (such as the device 100 ), according to an embodiment of the present disclosure, is illustrated.
  • the process 200 is initiated at which point control transfers to decision block 204 .
  • the processor 102 determines whether a tracking mechanism trigger has been received. If a tracking mechanism trigger is not received in block 204 , control transfers to block 214 , where the process 200 terminates. If a tracking mechanism trigger is received in block 204 , control transfers to block 206 where identifying information on a user of the device 100 is captured (e.g., under the control of a basic input/output system (BIOS)), which periodically enables one or more of the devices included in the input device 110 .
  • BIOS basic input/output system
  • the identifying information may correspond to voice (captured by a microphone) of the user, a picture (captured by a camera) of the user, a fingerprint (captured by a fingerprint reader) of the user, or other biometric information of the user.
  • the identifying information is stored in non-volatile storage of the device 100 .
  • the non-volatile storage may correspond to an HDD or flash memory that is only accessible by the BIOS.
  • the identifying information may be transmitted to a device recovery service provider (or other entity) via, for example, an Internet connection.
  • the processor 102 captures input data (e.g., provided by the user via a pointing device or a keyboard) to the device 100 .
  • the input data may for example, provide an indication of web sites visited by the user, among other information.
  • the processor 102 causes the input data to be stored in the non-volatile storage.
  • the input data may be transmitted to a device recovery service provider (or other entity) via, for example, an Internet connection.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.

Description

    BACKGROUND
  • 1. Field
  • This disclosure relates generally to capturing identifying information and, more specifically, to techniques for capturing identifying information on a device user.
  • 2. Related Art
  • Laptop computer system are frequently stolen from locations such as coffee shops, college campuses, hotel rooms, homes, businesses, and motor vehicles. In general, theft of a computer system may result in the loss of photos, files, personal information, and business information that is stored on the stolen computer system. Today, devices such as desktop computer systems, notebook computer systems, laptop computer systems, and personal digital assistants (PDAs) usually execute a wide variety of applications.
  • For example, a theft recovery application (e.g., LoJack®) may be installed on a computer system (e.g., a portable (such as a laptop or notebook) or a desktop computer system) to facilitate tracking, locating, and recovering the computer system when the computer system is reported stolen. The installed theft recovery application, upon activation, reports a location of the computer system to a monitoring center (when the computer system is coupled to the Internet via a wired or wireless connection). In this case, based on a reported theft, authorities may be notified to recover the stolen computer system. Unfortunately, even when authorities recover a stolen computer system, the authorities frequently do not have sufficient evidence to prosecute an individual in possession of the stolen computer system for the theft of the computer system or receiving stolen property.
  • SUMMARY
  • According to one aspect of the present disclosure, a technique for identifying a user of a device (e.g., a computer system) includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger. The captured identifying information may then be utilized by authorities (as evidence) to prosecute an individual in possession of a stolen device for the theft of the device or receiving stolen property.
  • According to another aspect of the present disclosure, a computer system includes an input device, non-volatile storage, and a processor coupled to the non-volatile storage and the input device. The processor is configured to receive a tracking mechanism trigger and control the input device to capture identifying information on a user of the computer system in response to the trigger. The processor is also configured to store the identifying information in the non-volatile storage, such that the identifying information may be later recovered by authorities and used as evidence in prosecution of the user.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention is illustrated by way of example and is not intended to be limited by the accompanying figures, in which like references indicate similar elements. Elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale.
  • FIG. 1 is a block diagram of a relevant portion of an example device (e.g., a computer system) that is configured to identify a user of the device, according to various embodiments of the present disclosure.
  • FIG. 2 is a flowchart of a process for identifying a user of a device (e.g., a computer system), according to an embodiment of the present disclosure.
  • DETAILED DESCRIPTION
  • As will be appreciated by one of ordinary skill in the art, aspects of the present invention may be embodied as a method, system, device, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a circuit, module, or system.
  • Any suitable computer-usable or computer-readable storage medium may be utilized. The computer-usable or computer-readable storage medium may be, for example, (but is not limited to) an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM) or flash memory, a portable compact disc read-only memory (CD-ROM), an optical storage device, or a magnetic storage device. Note that the computer-usable or computer-readable storage medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory. In the context of this disclosure, a computer-usable or computer-readable storage medium may be any medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device. As used herein, the term “coupled” includes both a direct electrical connection between blocks or components and an indirect electrical connection between blocks or components achieved using one or more intervening blocks or components.
  • According to various aspects of the present disclosure, techniques may be employed that aid authorities (law enforcement) in the prosecution of an individual in wrongful possession of a device (e.g., computer system) by capturing identifying information on the individual. According to various disclosed techniques, a theft recovery application on a computer system is activated (in response to a received tracking mechanism trigger) after a theft of the computer system is reported to a device recovery service provider. The trigger is used to initiate capture of identifying information on a user of the computer system. The identifying information may include various biometric information, depending on individual capabilities of the computer system. For example, a computer system with an integrated camera may capture one or more pictures of the user following the trigger. As another example, a computer system with integrated speech capability may capture voice of the user (via a microphone) following the trigger. As yet another example, a computer system with an integrated fingerprint reader may capture a fingerprint of the user following the trigger.
  • With reference to FIG. 1, an example device 100 is illustrated that may be configured to capture identifying information on a user of the device 100 in response to a tracking mechanism trigger, according to various embodiments of the present disclosure. In a typical situation, the trigger is generated by a device recovery service provider in response to receiving a reported theft of the device 100. The device 100 may be, for example, a computer system or a smart phone that executes an operating system (OS) and multiple applications, one of which is a theft recovery application. The device 100 includes a processor 102 that is coupled to a memory controller 104, which is coupled to a memory subsystem 106 and an input/output (I/O) controller 108. As is illustrated, the I/O controller 108 is coupled to an input device 110, a vibrator 112, a display 114, a speaker 116, an accelerometer 118, and a network interface controller (NIC) 120, which may facilitate a wired or wireless Internet connection.
  • The processor 102 may include one or more processor cores and one or more levels of cache. The memory subsystem 106 includes an application appropriate amount of volatile memory (e.g., dynamic random access memory (DRAM)) and non-volatile memory (e.g., read-only memory (ROM) and/or flash memory). The input device 110 may include, for example, a pointing device (such as a mouse), a keyboard, a microphone, a fingerprint reader, and a camera, among other input devices. The display 114 may be, for example, a cathode ray tube (CRT) or a liquid crystal display (LCD). The processor 102 may also be coupled to one or more mass storage devices (not shown), e.g., non-volatile storage such as a hard disk drive (HDD) and/or a compact disc read-only memory (CD-ROM) drive, via a port. As is illustrated, the device 100 also includes a power-in port 122 for receiving a power adapter cable or an AC power cable.
  • With reference to FIG. 2, an example process 200 for identifying a user of a device (such as the device 100), according to an embodiment of the present disclosure, is illustrated. In block 202, the process 200 is initiated at which point control transfers to decision block 204. In block 204, the processor 102 determines whether a tracking mechanism trigger has been received. If a tracking mechanism trigger is not received in block 204, control transfers to block 214, where the process 200 terminates. If a tracking mechanism trigger is received in block 204, control transfers to block 206 where identifying information on a user of the device 100 is captured (e.g., under the control of a basic input/output system (BIOS)), which periodically enables one or more of the devices included in the input device 110. For example, the identifying information may correspond to voice (captured by a microphone) of the user, a picture (captured by a camera) of the user, a fingerprint (captured by a fingerprint reader) of the user, or other biometric information of the user.
  • Next, in block 208, the identifying information is stored in non-volatile storage of the device 100. For example, the non-volatile storage may correspond to an HDD or flash memory that is only accessible by the BIOS. Alternatively, or in combination with storing the identifying information in the non-volatile storage device, the identifying information may be transmitted to a device recovery service provider (or other entity) via, for example, an Internet connection. Then, in block 210, the processor 102 captures input data (e.g., provided by the user via a pointing device or a keyboard) to the device 100. The input data may for example, provide an indication of web sites visited by the user, among other information. Next, in block 212, the processor 102 causes the input data to be stored in the non-volatile storage. Alternatively, or in combination with storing the input data in the non-volatile storage device, the input data may be transmitted to a device recovery service provider (or other entity) via, for example, an Internet connection. Following block 212, control transfers to block 214 where the process 200 terminates.
  • Accordingly, techniques have been disclosed herein that readily facilitate identifying a user of a device in response to a tracking mechanism trigger associated with a theft recovery application.
  • The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
  • The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
  • The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below, if any, are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
  • Having thus described the invention of the present application in detail and by reference to preferred embodiments thereof, it will be apparent that modifications and variations are possible without departing from the scope of the invention defined in the appended claims.

Claims (20)

1. A method of identifying a user of a device, comprising:
receiving a tracking mechanism trigger; and
capturing identifying information on the user of the device in response to the tracking mechanism trigger.
2. The method of claim 1, wherein the tracking mechanism trigger is transmitted in response to a reported theft of the device.
3. The method of claim 1, wherein the identifying information corresponds to biometric information associated with the user of the device.
4. The method of claim 3, wherein the biometric information corresponds to voice, a picture, or a fingerprint of the user of the device.
5. The method of claim 1, further comprising:
storing the identifying information in non-volatile storage.
6. The method of claim 5, wherein the non-volatile storage corresponds to an area of a hard disk drive that is only accessible to a basic input/output system of the device.
7. The method of claim 5, further comprising:
capturing input data to the device provided via an input device, wherein the input device is a keyboard or a pointing device; and
storing the input data in the non-volatile storage.
8. The method of claim 7, further comprising:
tracking activities of the user of the device based on the stored input data.
9. A computer system, comprising:
an input device;
non-volatile storage; and
a processor coupled to the non-volatile storage and the input device, wherein the processor is configured to:
receive a tracking mechanism trigger;
control the input device to capture identifying information on a user of the computer system in response to the tracking mechanism trigger; and
store the identifying information in the non-volatile storage.
10. The computer system of claim 9, wherein the tracking mechanism trigger is transmitted to the computer system in response to a reported theft of the computer system.
11. The computer system of claim 9, wherein the identifying information corresponds to biometric information associated with the user of the computer system and the input device is a biometric input device.
12. The computer system of claim 11, wherein the biometric information corresponds to voice, a picture, or a fingerprint of the user of the computer system.
13. The computer system of claim 9, wherein the non-volatile storage is a flash memory.
14. The computer system of claim 9, wherein the non-volatile storage corresponds to an area of a hard disk drive that is only accessible to a basic input/output system of the computer system.
15. The computer system of claim 9, further comprising:
a second input device coupled to the processor, wherein the processor is further configured to:
capture input data to the computer system provided via the second input device, wherein the second input device is a keyboard or a pointing device; and
store the input data in the non-volatile storage.
16. The computer system of claim 15, wherein the input data facilitates tracking activities of the user of the computer system.
17. A computer program product embodied on or more computer-readable storage medium, comprising:
first code configured to receive a tracking mechanism trigger; and
second code configured to control an input device to capture identifying information on a user of a computer system in response to the tracking mechanism trigger.
18. The computer program product of claim 17, further comprising:
third code configured to store the identifying information in non-volatile storage.
19. The computer program product of claim 17, wherein the tracking mechanism trigger is transmitted to the computer system via an Internet connection in response to a reported theft of the computer system.
20. The computer program product of claim 17, wherein the identifying information corresponds to biometric information associated with the user of the computer system.
US12/054,531 2008-03-25 2008-03-25 Techniques for capturing identifying information on a device user Active 2030-12-20 US8490200B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/054,531 US8490200B2 (en) 2008-03-25 2008-03-25 Techniques for capturing identifying information on a device user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/054,531 US8490200B2 (en) 2008-03-25 2008-03-25 Techniques for capturing identifying information on a device user

Publications (2)

Publication Number Publication Date
US20090249485A1 true US20090249485A1 (en) 2009-10-01
US8490200B2 US8490200B2 (en) 2013-07-16

Family

ID=41119219

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/054,531 Active 2030-12-20 US8490200B2 (en) 2008-03-25 2008-03-25 Techniques for capturing identifying information on a device user

Country Status (1)

Country Link
US (1) US8490200B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100211687A1 (en) * 2009-02-16 2010-08-19 Dell Products L.P. Systems and methods for logging user input data for subsequent retrieval
US20110057797A1 (en) * 2009-09-09 2011-03-10 Absolute Software Corporation Alert for real-time risk of theft or loss
CN107766727A (en) * 2016-08-16 2018-03-06 联想(新加坡)私人有限公司 For the device and method for allowing to conduct interviews to wrong data

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10742634B1 (en) 2011-12-27 2020-08-11 Majid Shahbazi Methods for single sign-on (SSO) using optical codes
CN104751087A (en) * 2015-03-04 2015-07-01 深圳市金立通信设备有限公司 Terminal
CN104751086A (en) * 2015-03-04 2015-07-01 深圳市金立通信设备有限公司 Terminal anti-theft method
US10509900B1 (en) 2015-08-06 2019-12-17 Majid Shahbazi Computer program products for user account management
US10891372B1 (en) 2017-12-01 2021-01-12 Majid Shahbazi Systems, methods, and products for user account authentication and protection

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
US7134006B2 (en) * 2003-06-03 2006-11-07 Gateway Inc. Method and system for changing software access level within or outside a host protected area
US20070273479A1 (en) * 2006-05-25 2007-11-29 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Personalized device owner identifier
US20080018927A1 (en) * 2006-07-21 2008-01-24 Research In Motion Limited Method and system for providing a honeypot mode for an electronic device
US20080132245A1 (en) * 2006-11-30 2008-06-05 Motorola, Inc. Method and apparatus for surreptitiously triggering the collection of data from a lost wireless communications device equipped with audio and/or video collection means
US20080186162A1 (en) * 2007-02-06 2008-08-07 Qualcomm Incorporated Apparatus and Methods for Locating, Tracking and/or Recovering a Wireless Communication Device
US7446655B2 (en) * 2004-06-18 2008-11-04 Qualcomm Incorporated Tracking lost and stolen mobile devices using location technologies and equipment identifiers

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7134006B2 (en) * 2003-06-03 2006-11-07 Gateway Inc. Method and system for changing software access level within or outside a host protected area
US20050183143A1 (en) * 2004-02-13 2005-08-18 Anderholm Eric J. Methods and systems for monitoring user, application or device activity
US7446655B2 (en) * 2004-06-18 2008-11-04 Qualcomm Incorporated Tracking lost and stolen mobile devices using location technologies and equipment identifiers
US20070273479A1 (en) * 2006-05-25 2007-11-29 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Personalized device owner identifier
US20080018927A1 (en) * 2006-07-21 2008-01-24 Research In Motion Limited Method and system for providing a honeypot mode for an electronic device
US20080132245A1 (en) * 2006-11-30 2008-06-05 Motorola, Inc. Method and apparatus for surreptitiously triggering the collection of data from a lost wireless communications device equipped with audio and/or video collection means
US20080186162A1 (en) * 2007-02-06 2008-08-07 Qualcomm Incorporated Apparatus and Methods for Locating, Tracking and/or Recovering a Wireless Communication Device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100211687A1 (en) * 2009-02-16 2010-08-19 Dell Products L.P. Systems and methods for logging user input data for subsequent retrieval
US20110057797A1 (en) * 2009-09-09 2011-03-10 Absolute Software Corporation Alert for real-time risk of theft or loss
US8717172B2 (en) 2009-09-09 2014-05-06 Absolute Software Corporation Alert for real-time risk of theft or loss
US8878672B2 (en) 2009-09-09 2014-11-04 Absolute Software Corporation Alert for real-time risk of theft or loss
US8902066B2 (en) 2009-09-09 2014-12-02 Absolute Software Corporation Alert for real-time risk of theft or loss
CN107766727A (en) * 2016-08-16 2018-03-06 联想(新加坡)私人有限公司 For the device and method for allowing to conduct interviews to wrong data

Also Published As

Publication number Publication date
US8490200B2 (en) 2013-07-16

Similar Documents

Publication Publication Date Title
US8490200B2 (en) Techniques for capturing identifying information on a device user
CN107169329A (en) A kind of method for protecting privacy, mobile terminal and computer-readable recording medium
WO2017005085A1 (en) Data compression method, apparatus, and terminal
JP2017510008A (en) Firmware restoration method, apparatus, terminal, program, and recording medium
US20090222499A1 (en) Method, apparatus and storage device for data protection
CN103514065B (en) Electronic device and method with automatic detection and recovery functions
KR20150019813A (en) Method for controlling an content integrity and an electronic device
CN105787868A (en) Picture compression method and device and electronic equipment
KR20160086754A (en) Firmware refreshing method and device
WO2017166760A1 (en) Method, apparatus, mobile terminal, and electronic device for reviewing image file
US20140223320A1 (en) Information processing system, information processing device, and method
US20130083194A1 (en) Video monitoring server and method
CN108141517A (en) For handling the electronic equipment of image and method
US20130166549A1 (en) Providing Access to Media Content in Multiple Locations
WO2017016139A1 (en) System recovery method and apparatus
US20170076427A1 (en) Methods and devices for outputting a zoom sequence
CN106294576A (en) The method for cleaning of a kind of Android system memory space and system
US9753933B2 (en) Electronic device and method for mounting file system using virtual block device
US9087057B2 (en) Content processing apparatus, method, and system
CN114356799B (en) Data storage method, device, system and computer readable storage medium
EP3328066B1 (en) Electronic device and method for autofocusing
CN103207968B (en) Method for recording operation history, and management method and system for information security
US10628100B2 (en) Electronic device that transmits usage information when communicably connected to a mediation device and device management system
KR102166871B1 (en) Method and apparatus for controlling a contents in portable device with flexible display
US20100180282A1 (en) Computer system and method for installing driver program in the computer system

Legal Events

Date Code Title Description
AS Assignment

Owner name: LENOVO (SINGAPORE) PTE. LTD, SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RIVERA, DAVID;CHALLENER, DAVID C.;WALTERMANN, ROD D.;REEL/FRAME:020695/0460;SIGNING DATES FROM 20080321 TO 20080324

Owner name: LENOVO (SINGAPORE) PTE. LTD, SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RIVERA, DAVID;CHALLENER, DAVID C.;WALTERMANN, ROD D.;SIGNING DATES FROM 20080321 TO 20080324;REEL/FRAME:020695/0460

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: LENOVO PC INTERNATIONAL, HONG KONG

Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:LENOVO (SINGAPORE) PTE LTD.;REEL/FRAME:037211/0173

Effective date: 20131001

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: LENOVO PC INTERNATIONAL LIMITED, HONG KONG

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LENOVO (SINGAPORE) PTE. LTD.;REEL/FRAME:049678/0824

Effective date: 20131001

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

AS Assignment

Owner name: LENOVO SWITZERLAND INTERNATIONAL GMBH, SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LENOVO PC INTERNATIONAL LIMITED;REEL/FRAME:069870/0670

Effective date: 20241231